Andre Cronje: A $200M rsETH Theft May Stem from Private Key Leakage or Misconfiguration — Why ETH Was Withdrawn From Aave to Protect Liquidity

Apr 19, 2026

Andre Cronje: A $200M rsETH Theft May Stem from Private Key Leakage or Misconfiguration — Why ETH Was Withdrawn From Aave to Protect Liquidity

On April 19, 2026, Sonic Labs co-founder and Flying Tulip founder Andre Cronje said the team is still investigating the “L0 / rsETH” incident. His preliminary view: the root cause may be a private key compromise or a configuration mistake, leading to roughly $200M worth of rsETH being stolen. He added that the attacker subsequently deposited the stolen rsETH into Aave to borrow ETH, largely because rsETH spot liquidity was insufficient for immediate offloading without major slippage.

While the investigation is ongoing, this incident has already become a timely reminder of a 2025–2026 DeFi reality: composability can turn one protocol’s failure into another protocol’s balance-sheet problem, especially when the “asset” is bridged or restaked.

For broader on-chain context and timelines reported by independent analysts, see this reconstruction of the exploit path and Aave leg: TechFlow’s incident timeline. For market-level reporting on the resulting Aave exposure and emergency actions, see: Forbes’ coverage of the Aave rsETH bad-debt risk.


What likely happened (and why rsETH ended up on Aave)

Even when an attacker steals a token, exiting that token position is often the hardest part. If the market is thin, selling large size can collapse the price, draw attention, and reduce proceeds.

That’s why we repeatedly see a pattern in 2025–2026 exploits:

  1. Exploit / mint / steal an asset (often via a bridge, oracle, or privileged key).
  2. Use that asset as collateral on a major lending market (because the lending venue still “recognizes” the asset via its listing and oracle system).
  3. Borrow the most liquid blue-chip asset (ETH / WETH or major stablecoins).
  4. Move the borrowed asset elsewhere, leaving the lending market with potential bad debt if the collateral becomes impaired.

In this case, Cronje’s summary points to exactly that: the attacker allegedly used rsETH on Aave to borrow ETH because rsETH liquidity was not deep enough to unwind directly.

This is also why teams and large liquidity providers may choose to withdraw ETH from Aave during a fast-moving event: not necessarily because their own position is unsafe, but because system-wide ETH liquidity can become the scarce resource when everyone tries to delever or withdraw simultaneously.


“Technically collateralized” is not the same as “safe”

One detail in Cronje’s comment is important: the Aave position was described as technically collateral-backed.

That can be true in Aave’s accounting (overcollateralized position, LTV rules, liquidation thresholds). However, it may fail in practice if any of the following happens:

  • Collateral credibility breaks: if rsETH is unbacked or its redemption mechanism is paused, its “market value” can collapse faster than liquidators can act.
  • Oracle lag vs. real liquidity: the oracle price can stay higher than what the market can actually realize at size.
  • Liquidity evaporates under stress: liquidations require buyers; in a panic, bids disappear.
  • Risk controls kick in: markets can be frozen, LTV set to 0, or borrowing disabled, limiting “normal” liquidation flows.

Aave has previously used precautionary measures such as freezing assets and setting LTV to 0 to contain systemic exposure. For an example of how these controls are discussed and executed in practice, see this governance thread: Aave governance discussion on rsETH precautionary freezing.


Why the “L0 / bridge layer” matters more than ever in 2026

The keyword “L0” in Cronje’s statement is widely interpreted as a reference to cross-chain messaging / interoperability infrastructure. In the post-2025 environment, bridges and messaging layers are no longer “plumbing”—they are part of the asset’s trust model.

If rsETH can be minted / released on a destination chain due to:

  • compromised admin keys,
  • misconfigured endpoints,
  • or insufficient validation of cross-chain messages,

then the token may exist on-chain while being economically unbacked. Once such a token is accepted as collateral anywhere, contagion is immediate.

If you want to understand why cross-chain risk remains a top attack surface, start with LayerZero’s own technical resources and architecture descriptions: LayerZero documentation.


What users are asking right now (and what to do)

1) “Am I exposed if I never held rsETH?”

Possibly. Exposure is often indirect:

  • supplying ETH / WETH to lending markets that can be borrowed against rsETH,
  • holding vault shares that route collateral through Aave,
  • or sitting in leveraged looping strategies where liquidation liquidity depends on healthy markets.

Action: review your DeFi positions, and reduce leverage if your safety margin is thin.

2) “Should I withdraw ETH from Aave?”

There is no one-size-fits-all answer. But during incidents where a major collateral asset is questioned, liquidity can become reflexive: users withdraw because others withdraw.

Action: if you rely on immediate liquidity (e.g., for payroll, margins, or active trading), consider holding a higher buffer outside lending markets until the situation stabilizes.

3) “How do I minimize approval-based losses during chaos?”

In volatile incidents, phishing and malicious approval prompts spike.

Action: audit and revoke unnecessary token approvals regularly using a reputable allowance tool like Revoke.cash, and avoid signing transactions you don’t fully understand.


Security takeaways for teams: private keys and “boring” config are still the #1 risk

Cronje’s preliminary assessment (private key leakage or misconfiguration) aligns with a hard truth: many catastrophic losses are not novel smart contract bugs—they’re operational security failures.

Practical controls that matter in 2026:

  • least-privilege roles and time-locked admin actions,
  • multi-signature governance for upgrades and bridge parameters,
  • hardened key storage (offline or HSM-backed),
  • configuration change monitoring and alerting,
  • and “break-glass” emergency playbooks that are tested before an incident.

Even with audits, a leaked deployer key or a single wrong allowlist entry can undo months of engineering.


Where OneKey fits: self-custody reduces key-risk, but not protocol-risk

This incident is a good moment to separate two categories of risk:

  • Key risk (user-side): seed phrase leakage, malware, clipboard attacks, phishing signatures.
  • Protocol risk (system-side): bridge design flaws, oracle problems, collateral impairment, governance failures.

A hardware wallet primarily helps with the first category. If you’re actively using DeFi, OneKey can be a practical layer for isolating private keys from internet-connected devices, enforcing trusted transaction confirmation, and supporting a safer self-custody workflow across chains—especially when markets are moving fast and attackers are most active.

That said, no hardware wallet can “fix” a broken bridge or an unbacked collateral token. The best posture is layered: secure keys + conservative leverage + continuous monitoring.


Closing thoughts

The rsETH event underscores a 2025–2026 DeFi theme: as restaking assets and cross-chain liquidity become mainstream, risk concentrates in the edges—bridges, configurations, and operational controls—then propagates into the most liquid hubs like Aave.

Until final post-mortems are published, treat early numbers and attributions as preliminary. But the playbook is already familiar: thin liquidity assets get weaponized as collateral, and the most liquid markets absorb the shock.

If you’re building or using DeFi today, make “boring security” non-negotiable—and keep your private keys truly private.

Secure Your Crypto Journey with OneKey

View details for Shop OneKeyShop OneKey

Shop OneKey

The world's most advanced hardware wallet.

View details for Download AppDownload App

Download App

Scam alerts. All coins supported.

View details for OneKey SifuOneKey Sifu

OneKey Sifu

Crypto Clarity—One Call Away.

Andre Cronje: A $200M rsETH Theft May Stem from Private Key Leakage or Misconfiguration — Why ETH Was Withdrawn From Aave to Protect Liquidity - OneKey Blog